![]() Although the issue may seem situational and unlikely to be replicated, all it takes is one vulnerability for a hacker to gain control of a person’s device. ![]() ![]() The bugs revolve around exploiting issues with iCloud Sharing and the Safari 15 browser. The hacker described the hacking process in a lengthy blog post, going into detail as to how he was able to achieve the end result. He reported it to Apple, and for his contribution, he was paid a record-setting $100,500 bounty. Pickren found a dangerous vulnerability on Apple Mac devices that granted unauthorized camera access. student at the Georgia Institute of Technology. This was proven by Ryan Pickren, a cybersecurity Ph.D. Hackers typically have a bad reputation, but without them, many security issues would remain undetected.
0 Comments
Leave a Reply. |